Overview
Explore a 37-minute Black Hat conference talk detailing an attack against Windows Control Flow Guard (CFG) that evades integrity checks and achieves arbitrary code execution. Learn how the presenters discovered a design vulnerability, developed their attack strategy, and assess its potential impact. Gain insights from Andrea Biondo, Mauro Conti, and Daniele Lain as they demonstrate how to bypass CFG using less than 16 bytes of code. Access the full abstract and presentation materials for a deeper understanding of this Windows security exploit.
Syllabus
Back To The Epilogue: How to Evade Windows' Control Flow Guard with Less than 16 Bytes
Taught by
Black Hat